Search results for " Software Engineering"

showing 10 items of 582 documents

The Aquatic Surface Robot (AnSweR), a Lightweight, Low Cost, Multipurpose Unmanned Research Vessel

2021

Even though a few examples of aquatic surface robots exist, they are generally expensive, relatively large and heavy and tailored to custom-made hardware/software components that are not openly available to a broad public. In this work, the Aquatic Surface Robot (AnSweR), a newly-designed, lightweight, low cost, open-source, multipurpose unmanned research vessel is presented. The AnSweR features a lightweight and compact design that makes it fit in a backpack. Low-noise operation (in and above the surface) is achieved with a propulsion system based on two water-jets. Only affordable commercial-off-the-shelf (COTS) components are adopted. The primary goal of the AnSweR is to map underwater l…

business.industryComputer scienceComponent-based software engineeringSystems engineeringRobotRoboticsArtificial intelligencePropulsionArchitectureUnderwaterModular designSoftware architecturebusiness
researchProduct

Model Driven Architecture (MDA)

2003

business.industryComputer scienceComponent-based software engineeringSystems engineeringSoftware developmentArchitecturebusinessSoftware engineeringInformation SystemsWirtschaftsinformatik
researchProduct

Benchmarking non-photorealistic rendering of portraits

2017

We present a set of images for helping NPR practitioners evaluate their image-based portrait stylisation algorithms. Using a standard set both facilitates comparisons with other methods and helps ensure that presented results are representative. We give two levels of difficulty, each consisting of 20 images selected systematically so as to provide good coverage of several possible portrait characteristics. We applied three existing portrait-specific stylisation algorithms, two general-purpose stylisation algorithms, and one general learning based stylisation algorithm to the first level of the benchmark, corresponding to the type of constrained images that have often been used in portrait-s…

business.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringImage processing02 engineering and technologyBenchmarkingMachine learningcomputer.software_genreNon-photorealistic renderingImage (mathematics)Set (abstract data type)0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Key (cryptography)020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerAbstraction (linguistics)
researchProduct

Combination Of Handcrafted And Deep Learning-Based Features For 3d Mesh Quality Assessment

2020

We propose in this paper a novel objective method to evaluate the perceived visual quality of 3D meshes. The proposed method in no-reference, it relies only on the distorted mesh for the quality estimation. It is based on a pre-trained convolutional neural network (i.e VGG to extract features from the distorted mesh) and handcrafted features extracted directly from the 3D mesh (i.e curvature and dihedral angle). A General Regression Neural Network (GRNN) is used to learn the statistical parameters of the feature vectors and estimate the quality score. Experimental results from for subjective databases (LIRIS masking, LIRIS/EPFL generalpurpose, UWB compression and LEETA simplification) and c…

business.industryComputer scienceDeep learningFeature vectorFeature extraction020207 software engineeringPattern recognition02 engineering and technologyCurvatureConvolutional neural networkVisualizationMetric (mathematics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPolygon meshArtificial intelligencebusiness2020 IEEE International Conference on Image Processing (ICIP)
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct

New Areas of Application of Comparable Corpora

2019

This chapter describes several approaches of using comparable corpora beyond the area of MT for under-resourced languages, which is the primary focus of the ACCURAT project. Section 7.1, which is based on Rapp and Zock (Automatic dictionary expansion using non-parallel corpora. In: A. Fink, B. Lausen, W. Seidel, & A. Ultsch (Eds.) Advances in Data Analysis, Data Handling and Business Intelligence. Proceedings of the 32nd Annual Meeting of the GfKl, 2008. Springer, Heidelberg, 2010), addresses the task of creating resources for bilingual dictionaries using a seed lexicon; Sect. 7.2 (based on Rapp et al., Identifying word translations from comparable documents without a seed lexicon. Proceedi…

business.industryComputer scienceGroup method of data handlingSection (typography)020207 software engineering02 engineering and technology[SCCO.LING]Cognitive science/LinguisticsLexiconcomputer.software_genreFocus (linguistics)Task (project management)[SCCO]Cognitive scienceBusiness intelligence0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing[INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC]Artificial intelligencebusinesscomputerComputingMilieux_MISCELLANEOUSNatural language processingWord (computer architecture)
researchProduct

LifeRescue: A web based application for emergency responders during fire emergency response

2016

In order to respond to any kind of building fire emergencies, first-responders have to use lot of time to get access to the emergency data such as location of the victims who are still inside the building, location of the hazardous material, location of the resources and location of the exits in order to perform search and rescue. However, search is possibly one of the most dangerous activities on the fire ground. Sometimes the visibility is zero and the environment is really hot. Because of the limited operating time in the building, the key to successful search is how quickly emergency responders can get access to the emergency related information in order to save victims and the property…

business.industryComputer scienceInformation sharing020206 networking & telecommunications020207 software engineering02 engineering and technologyComputer securitycomputer.software_genreEmergency responseOrder (business)0202 electrical engineering electronic engineering information engineeringKey (cryptography)Operating timeWeb applicationbusinessVisibilitycomputerSearch and rescue2016 3rd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
researchProduct

High Level Modeling and Hardware Implementation of Image Processing Algorithms Using XSG

2019

International audience; Design of Systems-on-Chip has become very common especially with the remarkable advances in the field of high-level system modeling. In recent years, Matlab also offers a Simulink interface for the design of hardware systems. From a high-level specification, Matlab provides self-generation of HDL codes and/or FPGA configuration codes while providing other benefits of easy simulation. In addition, a large part of the Systems-on-Chip use at least one image processing algorithm and at the same time border detection is one of the most used algorithms. This paper presents a study and a hardware implementation of various algorithms of borders detection realized under Xilin…

business.industryComputer scienceInterface (computing)[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR]020207 software engineeringImage processing02 engineering and technologySystems modelingEdge detection[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]VHDLDigital image processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessMATLABField-programmable gate arraycomputerComputer hardwarecomputer.programming_language
researchProduct

Introducing the Concept of Hyperactivity in Multi Agent Systems

2013

International audience; Software Agents are no longer the simple communication gateways for devices to interconnect using one or more networks. With Multi Agent Systems contributing in a wide spectrum of intelligent systems, the Agents are in a more proactive role than just being responsible for passing messages between their respective base systems. Agent Relation Charts and the Hyperactive Transaction Model in general is one of the recent attempts of developing a multi-view design model for Multi Agent Systems. The model has made a clear distinction in the regular and intelligent activities of an agent. Based on these differences, the agents are classified into three main categories named…

business.industryComputer scienceMulti-agent systemAutonomous agentIntelligent decision support system020207 software engineering02 engineering and technologycomputer.software_genreComputingMethodologies_ARTIFICIALINTELLIGENCEAgent-based social simulationIntelligent agent[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV]Belief–desire–intention software modelSoftware agentHuman–computer interaction[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessAgent architecturecomputer
researchProduct

The Influence of Requirements in Software Model Development in an Industrial Environment

2017

Textual description of requirements is a specification technique that is widely used in industry, where time is key for success. How requirements are specified textually greatly depends on human factors. In order to study how requirements processing is affected by the level of detail in textual descriptions, this paper compares enriched textual requirements specifications with non-enriched ones. To do this, we have conducted an experiment in industry with 19 engineers of CAF (Construcciones y Auxiliares de Ferrocarril), which is a supplier of railway solutions. The experiment is a crossover design that analyzes efficiency, effectiveness, and perceived difficulty starting from a written spec…

business.industryComputer scienceProcess (engineering)Level of detail (writing)020207 software engineering02 engineering and technologyElectronic mailSoftware0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingSoftware requirementsSoftware engineeringbusinessSoftware measurementNatural language2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
researchProduct